Bradley Thies

Five steps to deal with third-party security risks This post was originally published on KCNext related to third-party risk management. Networks were once the fences that protected businesses from external threats…

This post was originally published on Medical Practice Insider. Not long ago, hackers focused on stealing financial data. The digitization of financial transactions brought heavy regulation and security to protect…

This post was originally published on SmartDataCollective. Compliance is a relative term, as every industry has its own rules and regulations. Healthcare has the Health Insurance Portability and Accountability Act,…

This post was originally published on Business.com. The “cloud” is a popular marketing buzzword in business today. Despite the fervor surrounding it, many are still uncertain about what this term actually means….

This post was originally published on Small Business Computing. Every organization requires some form of management; otherwise, it would be called a disorganization and business success would be elusive at…

In late 2014, the American Institute of Certified Public Accountants updated the criteria for the Trust Services Principles related to security, availability, processing integrity, and confidentiality (most commonly reported out…